Bug #13579 | Possible binary log DoS vulnerability | ||
---|---|---|---|
Submitted: | 28 Sep 2005 17:34 | Modified: | 29 Sep 2005 8:13 |
Reporter: | Michael Dopheide | Email Updates: | |
Status: | Closed | Impact on me: | |
Category: | MySQL Server | Severity: | S2 (Serious) |
Version: | 4.1.13 | OS: | Linux (Linux, kernel 2.4.31) |
Assigned to: | CPU Architecture: | Any |
[28 Sep 2005 17:34]
Michael Dopheide
[29 Sep 2005 8:13]
Hartmut Holzgraefe
there are two ways to avoid this already: in 4.x you can limit max_allowed_packet and in 5.0 you can set sql_mode=TRADITIONAL so that attempts to insert data that exceeds field lengths leads to SQL errors
[3 Oct 2005 20:30]
Michael Dopheide
So in order to protect ourselves from a large binary log DoS, our options are to lose functionality in one of two ways? That sounds like a work around, not a solution.